| Filename | Modified | Size |
| ../ | - | - |
| Differentiating Evil from Benign in the Normally Abnormal World - SANS Threat Hunting Summit 2018.en.srt | Sun, 28 May 2023 03:49:28 GMT | 52938 |
| How to Submit a Threat Profile to MITRE ATT&CK - SANS Threat Hunting Summit 2018.en.srt | Sun, 28 May 2023 03:50:20 GMT | 36721 |
| Hunting Webshells Tracking TwoFace - SANS Threat Hunting Summit 2018.en.srt | Sun, 28 May 2023 03:50:21 GMT | 62164 |
| Lean Hunting - SANS Threat Hunting Summit 2018.en.srt | Sun, 28 May 2023 03:50:21 GMT | 46129 |
| Leveraging Data Science to Discover Persistent Threats - SANS Threat Hunting Summit 2018.en.srt | Sun, 28 May 2023 03:50:29 GMT | 25939 |
| Quantify Your Hunt Not Your Parents’ Red Team - SANS Threat Hunting Summit 2018.en.srt | Sun, 28 May 2023 03:50:35 GMT | 85859 |
| Threat Hunting Using Live Box Forensics - SANS Threat Hunting Summit 2018.en.srt | Sun, 28 May 2023 03:50:40 GMT | 53219 |
| Threat Hunting Using Live Box Forensics - SANS Threat Hunting Summit 2018.mp4 | Sun, 28 May 2023 04:01:24 GMT | 68599072 |
| Uncovering and Visualizing Malicious Infrastructure - SANS Threat Hunting Summit 2018.en.srt | Sun, 28 May 2023 03:50:44 GMT | 50127 |
| Who Done It Gaining Visibility and Accountability in the Cloud - SANS Threat Hunting Summit 2018.en.srt | Sun, 28 May 2023 03:51:04 GMT | 35479 |